{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:51:19Z","timestamp":1726062679252},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030372279"},{"type":"electronic","value":"9783030372286"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37228-6_19","type":"book-chapter","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:00:05Z","timestamp":1576490405000},"page":"386-405","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Measuring Tor Relay Popularity"],"prefix":"10.1007","author":[{"given":"Tao","family":"Chen","sequence":"first","affiliation":[]},{"given":"Weiqi","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Chan-Tin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,13]]},"reference":[{"key":"19_CR1","unstructured":"Alexa top sites (2017). \nhttps:\/\/www.alexa.com\/topsites"},{"key":"19_CR2","doi-asserted-by":"publisher","unstructured":"Anwar, R., Niaz, H., Choffnes, D., Cunha, I., Gill, P., Katz-Bassett, E.: Investigating interdomain routing policies in the wild. In: Proceedings of the 2015 Internet Measurement Conference, IMC 2015, pp. 71\u201377. ACM, New York (2015). \nhttps:\/\/doi.org\/10.1145\/2815675.2815712","DOI":"10.1145\/2815675.2815712"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, October 2007","DOI":"10.1145\/1314333.1314336"},{"key":"19_CR4","unstructured":"China Blocking Tor (2018). \nhttps:\/\/blog.torproject.org\/blog\/china-blocking-tor-round-two"},{"key":"19_CR5","unstructured":"Controller, S.T.: (2017). \nhttps:\/\/stem.torproject.org\/"},{"key":"19_CR6","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004, vol. 13, p. 21. USENIX Association, Berkeley (2004). \nhttp:\/\/dl.acm.org\/citation.cfm?id=1251375.1251396"},{"key":"19_CR7","unstructured":"Edman, M., Syverson, P.F.: AS-awareness in tor path selection. In: Al-Shaer, E., Jha, S., Keromytis, A.D. (eds.) Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, 9\u201313 November 2009, pp. 380\u2013389. ACM (2009)"},{"key":"19_CR8","unstructured":"Evans, N., Dingledine, R., Grothoff, C.: A practical congestion attack on tor using long paths. In: Proceedings of the 18th USENIX Security Symposium, August 2009"},{"key":"19_CR9","unstructured":"Facebook Hidden Service (2014). \nhttps:\/\/blog.torproject.org\/facebook-hidden-services-and-https-certs"},{"key":"19_CR10","doi-asserted-by":"publisher","unstructured":"Feamster, N., Dingledine, R.: Location diversity in anonymity networks. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, pp. 66\u201376. ACM, New York (2004). \nhttps:\/\/doi.org\/10.1145\/1029179.1029199","DOI":"10.1145\/1029179.1029199"},{"key":"19_CR11","unstructured":"Imani, M., Amirabadi, M., Wright, M.: Modified relay selection and circuit selection for faster tor. CoRR abs\/1608.07343 (2016). \nhttp:\/\/arxiv.org\/abs\/1608.07343"},{"key":"19_CR12","unstructured":"Iran Blocks Tor (2018). \nhttps:\/\/blog.torproject.org\/blog\/iran-blocks-tor-tor-releases-same-day-fix"},{"key":"19_CR13","doi-asserted-by":"publisher","unstructured":"Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P.: Users get routed: traffic correlation on tor by realistic adversaries. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, pp. 337\u2013348. ACM, New York (2013). \nhttps:\/\/doi.org\/10.1145\/2508859.2516651","DOI":"10.1145\/2508859.2516651"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Ling, Z., Luo, J., Yu, W., Fu, X., Xuan, D., Jia, W.: A new cell counter based attack against tor. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 578\u2013589. ACM (2009)","DOI":"10.1145\/1653662.1653732"},{"key":"19_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-642-14992-4_19","volume-title":"Financial Cryptography and Data Security","author":"K Loesing","year":"2010","unstructured":"Loesing, K., Murdoch, S.J., Dingledine, R.: A case study on measuring statistical data in the tor anonymity network. In: Sion, R., et al. (eds.) FC 2010. LNCS, vol. 6054, pp. 203\u2013215. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-14992-4_19"},{"key":"19_CR16","unstructured":"Murdoch, S.J., Danezis, G.: Low-cost traffic analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS, May 2005"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-75551-7_11","volume-title":"Privacy Enhancing Technologies","author":"SJ Murdoch","year":"2007","unstructured":"Murdoch, S.J., Zieli\u0144ski, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 167\u2013183. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-75551-7_11\n\n. \nhttp:\/\/dl.acm.org\/citation.cfm?id=1779330.1779341"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Nithyanand, R., Starov, O., Zair, A., Gill, P., Schapira, M.: Measuring and mitigating as-level adversaries against tor. arXiv preprint \narXiv:1505.05173\n\n (2015)","DOI":"10.14722\/ndss.2016.23322"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"\u00d8verlier, L., Syverson, P.: Locating hidden servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS, May 2006","DOI":"10.1109\/SP.2006.24"},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-540-76929-3_5","volume-title":"Advances in Computer Science \u2013 ASIAN 2007. Computer and Network Security","author":"G O\u2019Gorman","year":"2007","unstructured":"O\u2019Gorman, G., Blott, S.: Large scale simulation of tor. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 48\u201354. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-76929-3_5"},{"key":"19_CR21","unstructured":"PlanetLab (2017). \nhttps:\/\/www.planet-lab.org\/"},{"key":"19_CR22","unstructured":"Protocols and test Specifications (2018). \nhttps:\/\/gitweb.torproject.org\/torspec.git\/tree\/dir-spec.txt"},{"key":"19_CR23","unstructured":"Sun, Y., et al.: Raptor: routing attacks on privacy in tor. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 271\u2013286 (2015)"},{"key":"19_CR24","doi-asserted-by":"crossref","unstructured":"Syverson, P.F., Tsudik, G., Reed, M.G., Landwehr, C.E.: Towards an analysis of onion routing security. In: Workshop on Design Issues in Anonymity and Unobservability (2000)","DOI":"10.21236\/ADA465255"},{"key":"19_CR25","unstructured":"Tor (2017). \nhttps:\/\/www.torproject.org\/"},{"key":"19_CR26","unstructured":"Tor Metrics Portal (2017). \nhttps:\/\/metrics.torproject.org\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37228-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T10:02:06Z","timestamp":1576490526000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37228-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030372279","9783030372286"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37228-6_19","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}